As Internet of Things (IoT) involvement increases in our daily lives, several security and privacy concerns like linkability, unauthorized conversations, and side-channel attacks are …
D Hauweele, B Quoitin - Proceedings of the 22nd International ACM …, 2019 - dl.acm.org
The protocols used in Wireless Sensor Networks are subject to very strict temporal synchronization constraints. Radio Duty Cycle (RDC) protocols in particular are …
EM Timofte, AL Balan, T Iftime - 2024 International Conference …, 2024 - ieeexplore.ieee.org
In this paper we are proposing an authentication method based on the energy usage patterns of connected devices. This approach marks a step up from traditional security …
Abstract Security of Internet of Things (IoT) devices is important for the acceptance of IoT applications. Several security mechanisms have been proposed, however, due to the limited …
The Internet of Things (IoT) revolutionizes our lifestyle and companies, with real-time traffic analysis and environment monitoring, from anywhere on Earth. However, the adoption of IoT …